An Application-Based Tool That Contains Both an Enhanced Password Generator and a Password Strength Checker

Abstract

The most common user authentication method for restricted resource access has been passwords. The fundamental problem with passwords is their strength or quality, or how easily or difficult they can be "guessed" by an outsider wishing to gain access to a resource you have access to by impersonating you. In this article, we examine multiple metrics related to password quality, one of which we have also suggested, and evaluate their advantages, disadvantages, and connections. We also experimented with cracking a series of passwords of varying complexity. The results of the experiments show that the quality of the passwords and their guess ability are positively correlated. 

Country : Sultanate of Oman

1 Hazam Hamood Al-Zakwani2 Dr. Ramesh Palanisamy

  1. Department of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  2. Department of Information Technology, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

IRJIET, Volume 7, Issue 12, December 2023 pp. 203-208

doi.org/10.47001/IRJIET/2023.712028

References

  1. Huang, C.; Chen, S.; Zhang, Y.; Zhou, W.; Rodrigues, J.J.; de Albuquerque, V.H.C. A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning. IEEE Internet Things J. 2021, 9, 17089–17097.
  2. Li, H.; Yu, L.; He, W. The impact of GDPR on global technology development. J. Glob. Inform. Technol. Manag. 2019, 22, 1–6.
  3. Kloza, D.; Van Dijk, N.; Casiraghi, S.; Vazquez Maymir, S.; Roda, S.; Tanas, A.; Konstantinou, I. Towards a method for data protection impact assessment: Making sense of GDPR requirements. Policy Brief D. Pia. Lab 2019, 1, 1–8.
  4. Haghshenas, S.H.; Hasnat, M.A.; Naeini, M. A temporal graph neural network for cyber attack detection and localization in smart grids. In Proceedings of the 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 16–19 January 2023.
  5. Inayat, U.; Zia, M.F.; Mahmood, S.; Khalid, H.M.; Benbouzid, M. Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. Electronics 2022, 11, 1502.
  6. Rastenis, J.; Ramanauskaite, S.; Suzdalev, I.; Tunaityte, K.; Januleviˇcius, J.; ˙ Cenys, A. Multi-Language spam/Phishing classification ˇby Email Body text: Toward automated security Incident investigation. Electronics 2021, 10, 668.
  7. Ceponis, D.; Goranin, N. Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow ˇCNN models for the host-based intrusion and malware detection task on univariate times series data. Appl. Sci. 2021, 10, 2373.
  8. Hughes-Lartey, K.; Li, M.; Botchey, F.E.; Qin, Z. Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon 2021, 7, e06522.
  9. Lal, N.A.; Prasad, S.; Farik, M. A review of authentication methods. Int. J. Sci. Technol. Res. 2016, 5, 246–249.
  10. Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and accuracy of fingerprint-based biometrics: A review. Symmetry 2019, 11, 141.
  11. Gwyn, T.; Roy, K.; Atay, M. Face recognition using popular deep net architectures: A brief comparative study. Fut. Internet 2021, 13, 164.
  12. Mehrubeoglu, M.; Nguyen, V. Real-time eye tracking for password authentication. In Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 12–14 January 2018.
  13. Mahesh, T.R.; Ram, M.S.; Ram, N.S.S.; Gowtham, A.; Swamy, T.N. Real-Time Eye Blinking for Password Authentication. In Proceedings of the International Conference on Intelligent Emerging Methods of Artificial Intelligence & Cloud Computing: Proceedings of IEMAICLOUD 2021, online, 26–29 April 2021.
  14. Juozapaviˇcius, A.; Brilingaite, A.; Bukauskas, L.; Lugo, R.G. Age and Gender Impact on Password Hygiene. ˙ Appl. Sci. 2022, 12,894.
  15. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186.
  16. Awad, M.; Al-Qudah, Z.; Idwan, S.; Jallad, A.H. Password security: Password behavior analysis at a small university. In Proceedings of the 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), Ras Al Khaimah, United Arab Emirates, 6–8 December 2016.
  17. Katsini, C.; Fidas, C.; Raptis, G.E.; Belk, M.; Samaras, G.; Avouris, N. Influences of human cognition and visual behavior onpassword strength during picture password composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Palais des Congrès de Montréal, Canada, 21–26 April 2018.
  18. Ur, B.; Segreti, S.M.; Bauer, L.; Christin, N.; Cranor, L.F.; Komanduri, S.; Kurilova, D.; Mazurek, M.L.; Melicher, W.; Shay, R.; et al. Measuring real-world accuracies and biases in modeling password guess ability. In Proceedings of the 24th {USENIX} Security Symposium ({USENIX} Security 15), Washington, DC, USA, 12–14 August 2015.
  19. Golla, M.; Dürmuth, M. On the Accuracy of Password Strength Meters. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 15–19 October 2018.
  20. Wheeler, D.L. zxcvbn: Low-Budget Password Strength Estimation. In Proceedings of the 25th USENIX Security, Austin, TX, USA, 10–12 August 2016.
  21. Doucek, P.; Pavlíˇcek, L.; Sedláˇcek, J.; Nedomová, L. Adaptation of password strength estimators to a non-english environment the Czech experience. Comput. Secur. 2020, 95, 101757.
  22. Hong, K.H.; Kang, U.G.; Lee, B.M. Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries. Secur. Communicat. Netw. 2021, 2021, 3122627.
  23. Python program to check password strength. (2023, May 13). W3resource. https://www.w3resource.com/python-exercises/cybersecurity/python-cybersecurity-exercise-3.php
  24. Python program to check the validity of a Password. (2017, December 20). Geeks for Geeks. https://www.geeksforgeeks.org/python-program-check-validity-password/
  25. Password strength. (2020, March 21). Wikipedia. https://en.wikipedia.org/wiki/Password_strength